![](/globalassets/security-management/security-technology/2021/august/the-strain-of-climate-change.jpg)
![](/globalassets/security-management/security-technology/2021/august/the-strain-of-climate-change.jpg)
August 2021
Mobilizing to Reduce the Strain of Climate Change
Climate change and other global risks pose a compounding security threat to military and security personnel and infrastructure, according to a new report by the International Military Council on Climate and Security.
But some defense agencies and alliances are already taking action to mitigate the threat by adopting greener technology, increasing the resiliency of their supply chains, and more.
![](/globalassets/security-management/security-technology/2021/august/0721-ross-johnson-sec-tech-main-image.jpg)
Protecting the Bulk Power System a Connection at a Time
![](/globalassets/security-management/security-technology/2021/august/genetec-featured-photo_1b.jpg)
Stop Holding On to an Outdated Access Control System
![](/globalassets/security-management/security-technology/2021/august/cyber-services.jpg)
Building A More Secure and Efficient Federal Enterprise
![](/globalassets/security-management/security-technology/2021/august/0721-sectec-ryker-vendor-banking-articleimage.jpg)
Financial Institutions Reap the Benefits by Forging Trusted Partnerships
![](/globalassets/security-management/security-technology/2021/august/utility-provider-dam.jpg)
Mission Almost Impossible: Siting Infrastructure in an Unpredictable World
![](/globalassets/security-management/security-technology/2021/august/sectech-pacs-sponsored-image.jpg)
Securing Financial Institutions: Four Ways Modernizing Physical Access Control Promotes Strong Network Security
![](/globalassets/security-management/security-technology/2021/august/connected-ics.jpg)
An Increasingly Connected ICS: Highlights from Dragos' 2020 Year in Review
![](/globalassets/security-management/security-technology/2021/august/food-security.jpg)
Toasting with Caution
![](/globalassets/security-management/security-technology/2021/august/0721-sectec-slotnick-cikr2.jpg)
Creating A Roadmap to Achieve Critical Infrastructure Protection
![](/globalassets/security-management/security-technology/2021/august/cisco_meraki.jpg)
Armed with Cloud, Security Pros Do More with Less
![](/globalassets/security-management/security-technology/2021/august/0721-sectec-owl-defence-articleimage.jpg)
An Energy Company’s Approach to Proactive Critical Infrastructure Security
![](/globalassets/security-management/security-technology/2021/june/sectec-threat-quotient-tl2.jpg)
Never Assume: Key Learning from the Colonial Pipeline Attack
![](/globalassets/security-management/security-technology/2021/august/agriculture-security.jpg)
The Next Big Target for Cyberattack: Agriculture and the Supply Chain
![](/globalassets/security-management/security-technology/2021/august/software-labeling.jpg)
Attacks on Critical Infrastructures are Rising. Is President Biden’s Executive Order the Solution?
![](/globalassets/security-management/security-technology/2021/august/career-management-critical-infrastructure.jpg)
Help Wanted: Why Young Professionals Should Consider a Career in Critical Infrastructure Security
![](/globalassets/security-management/security-technology/2021/august/0821-sectec-usb-cyber-threats.jpg)
USB Cyber Threats Are on the Rise. Here’s What You Can Do to Stop Them
![](/globalassets/security-management/security-technology/2021/august/nrn-884x500.jpg.jpg)